☠️
smadi0x86 Playground
  • 💀Welcome to smadi0x86 Playground
    • 🍷Resources
    • 🚬Projects
    • 🎓Certifications
    • 📌Pinned
    • ❓Questions
    • 📞Contact
  • 🏞️Cloud Native
    • Docker
      • Quick Reference
      • Introduction
      • Containers
      • Images
      • Storage & Volumes
      • Security
      • Cheatsheet
    • Git
    • Serverless Framework
    • YAML
  • 🔨Software Engineering
    • System Design
    • Environment Variables
    • JSON Web Tokens
  • 👾Architecture
    • C Language
      • Introduction
      • Calling Conventions
      • GCC Compilation
      • Libraries & Linking
      • I/O
      • Files
      • Pointers
      • Dynamic Memory Allocation
      • Data Types
      • Strings Manipulation
      • Bit Manipulation
      • Pre-processors
      • Macros
      • Type Qualifiers
    • C/C++ Build Systems
      • Fundamentals for Linking
      • Symbolic Linking
      • Cross-Platform Compilation
      • CMake for Building and Linking
      • Shared Libraries
      • Dynamic Linking and Dependency Management
    • Operating Systems
      • OS & Architecture
      • Processes
      • CPU Scheduling
      • Memory Management
  • 🛩️Cyber Warfare
    • Flight Physics
    • Communication
      • PWM & PPM
      • MAVLink
  • 🏴‍☠️Offensive Security
    • Active Directory
      • Introduction
    • Web Attacks
      • Server Side
        • OS Command Injection
        • Information Disclosure
        • Directory Traversal
        • Business Logic
        • Authentication
        • File Upload
        • SSRF
      • Client Side
        • CSRF
        • XSS
    • Recon
      • Active
        • Host discovery
        • Nmap
        • Mass Scan
      • Passive
        • Metadata
      • Web Applications
        • Discovery
        • Subdomains & Directories
        • SSL Certs
        • CMS
        • WAF Detection
      • Firewall Evasion
  • Binary Exploitation
    • Stack Smashing
      • x86
      • x86_64
    • pwntools
      • Processes and Communication
      • Logging and Context
      • Cyclic
      • Packing
      • ELF
      • ROP
  • 😈Advanced Persistent Threat
    • C2
      • Sliver
    • Malware
      • Windows Internals
        • PEB
      • Academy
        • Basics
      • Sektor7
        • Essentials
  • 💌Certifications
    • AWS Certified Cloud Practitioner (CLF-C01)
      • Cloud Foundations
      • Domain 1: Cloud Concepts
      • Domain 2: Security and Compliance
      • Domain 3: Technology
      • Domain 4: Billing and Pricing
    • AWS Certified Solutions Architect - Associate (SAA-C03)
      • Foundation
    • Certified Kubernetes Administrator (CKA)
      • Core Concepts
      • Scheduling
      • Logging & Monitoring
      • Application Lifecycle Management
      • Cluster Maintenance
      • Security
      • Storage
      • Networking
      • Design Kubernetes Cluster
      • Kubernetes The Kubeadm Way
      • Troubleshooting
      • JSONPATH
      • Lightning Lab
      • Mock Exams
      • Killer Shell
    • Certified Kubernetes Security (CKS)
      • Foundation
      • Cluster Setup
      • Cluster Hardening
      • Supply Chain Security
      • Runtime Security
      • System Hardening
      • Killer Shell
    • (KGAC-101) Kong Gateway Foundations
      • Introduction to APIs and API Management
      • Introduction to Kong Gateway
      • Getting Started with Kong Enterprise
      • Getting Started with Kong Konnect
      • Introduction to Kong Plugins
  • 📜Blog Posts
    • Modern Solutions For Preventing Ransomware Attacks
Powered by GitBook
On this page
  • General
  • Low Level Learning
  • Cloud Native
  • Kubernetes
  • Offensive Security
  • Malware Development
  • Command & Control
  • Malware Analysis
  • Exploit Development
  • Cyber Warfare
  1. Welcome to smadi0x86 Playground

Resources

Here are some resources I found incredibly helpful for learning.

PreviousWelcome to smadi0x86 PlaygroundNextProjects

Last updated 23 days ago

General

Low Level Learning

Cloud Native

Kubernetes

Offensive Security

Malware Development

Command & Control

Malware Analysis

Exploit Development

Cyber Warfare

💀
🍷
LeakIX
elhacker.NET - Descargas Manuales, Tutoriales y Libros
ReactOS: Main Page
NTAPI Undocumented Functions
Welcome to WinDbg.info
77KB
x86_assembly_reversing_cheat_sheet.pdf
pdf
Nynaeve
NtDoc - The native NT API online documentation
Vergilius Project
Cyber Library
secret clubsecret club
windows deep internals
Logo
Logo
Logo
Logo
Logo
https://wiki.osdev.org/Main_Page/wiki.osdev.org
Introduction · Linux Inside
Introduction · Linux Inside
Courses | OpenSecurityTraining2
samsclass.info: Sam Bowne Class Information
Linux Device Drivers, Third Edition [LWN.net]
Kernel CactusKernelCactus
Lectures | Thom WiggersThom Wiggers
Download QEMU - QEMU
Smashing the Stack for Fun & Profit : RevivedWhiskey Tango Foxtrot
Understanding Address Spacing in Detailtbhaxor
x86 Architecture - Windows driversMicrosoftLearn
Operating Systems: Schedule
Programming for Wannabes. Part I0x00sec - The Home of the Hacker
Computer Architecture: Assembly Language Cheatsheet | CodecademyCodecademy
GCC and Make - A Tutorial on how to compile, link and build C/C++ applications
C/C++ Preprocessors - GeeksforGeeksGeeksforGeeks
Introduction · Reverse Engineering
IntroductionToIntelx86-Part1.pdf
PalantirPalantir
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Terragrunt | Terraform wrapperTerragrunt | Terraform wrapper
MuleSoft | Integration Platform for Connecting SaaS and Enterprise ApplicationsMuleSoft
What is Nginx UI? | Nginx UI
Logo
TektonTekton
Open Source Cloud Computing Infrastructure - OpenStackOpenStack
Traefik, The Cloud Native Application Proxy | Traefik LabsTraefik Labs: Makes Networking Boring
Logo
Try out SonarQube
Logo
HAProxy - The Reliable, High Perf. TCP/HTTP Load Balancer
Polyglot persistence - definition and examples
Grafana: The open observability platformGrafana Labs
Page cover image
Prometheus - Monitoring system & time series database
Nix & NixOS | Reproducible builds and deployments
CloudQuery Integrations | CloudQueryCloudQuery
Osquery
Use Cloudquery & Osquery to Simplify Your Cloud MonitoringUptycs
Automating Malware Analysis Operations (MAOps) - JPCERT/CC EyesJPCERT/CC Eyes
Logo
MLflow - A platform for the machine learning lifecycleMLflow
Logo
HackTricks CloudHackTricks Cloud
Use a third party client certificate with mutual TLS for API Gateway APIsAmazon Web Services, Inc.
Downloads | SteampipeSteampipe
Logo
OverviewJenkins X - Cloud Native CI/CD Built On Kubernetes
Manage AWS accounts using Control Tower Account Factory for Terraform | Terraform | HashiCorp DeveloperManage AWS accounts using Control Tower Account Factory for Terraform | Terraform | HashiCorp Developer
Logo
Introduction to Cloud NativeInfluxData
Logo
The Twelve-Factor App
Logo
Terraform Registry
Terraform Pull Request Automation | Atlantis
What is GitOps?GitLab
Kong Ingress Controller - v2.11.x | Kong DocsKong Docs
Logo
Hybrid Mode Overview - v3.4.x | Kong DocsKong Docs
Logo
Microsoft Azure Fundamentals: Describe cloud concepts - TrainingMicrosoftLearn
Logo
DevSecOps – Everything You Need to KnowUnite.AI
DevSecOps Roadmap - Penetration Testing Tools, ML and Linux TutorialsPenetration Testing Tools, ML and Linux Tutorials
Black Hat USA 2019
Logo
K9s - Manage Your Kubernetes Clusters In Style
Logo
Network Policy Editor for Kubernetes
A Powerful Chaos Engineering Platform for Kubernetes | Chaos Mesh
Logo
Creating a cluster with kubeadmKubernetes
Apparmor - Unofficial Kubernetes
Logo
FalcoFalco
Kubescape
GitHub - aquasecurity/kube-hunter: Hunt for security weaknesses in Kubernetes clustersGitHub
Open Policy AgentOpenPolicyAgent
Crossplane - The cloud-native control plane frameworkcrossplane.io
Logo
How To Setup EFK Stack On Kubernetes: Step By Step GuidesDevopsCube
Harborproject_harbor
Logo
Logo
IstioIstio
Kamaji
KubeVirt.ioKubeVirt.io
vCluster - Virtual Kubernetes Clusters
Open, Multi-Cloud, Multi-Cluster Kubernetes Orchestration | karmada
Innovate EverywhereRancher Labs
Home - Knative
Logo
Karpenter
Logo
Kubewarden: Kubernetes Dynamic Admission at your fingertips
Logo
Argo CD - Declarative GitOps CD for Kubernetes
Artifact Hub
Open Lens | FlathubFlathub - Apps for Linux
Introduction
Kubernetes | NotionARK on Notion
EKS Workshop | EKS Workshop
Dark Vortex
AboutRed Teaming and Malware Analysis
READMEPentester's Promiscuous Notebook
Exploit Noteshideckies
HackTricksHackTricks
Home | The Hive
Logo
IntroductionCyberSec Wikimandine
Penetration Testing Active Directory, Part Ihausec
IntroductionRed Team Notes 2.0
IntroductionThe Hacker Recipes
What is ired.team?Red Teaming Experiments
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFGHome
Vergilius Project
Programming reference for the Win32 API - Win32 appsdocsmsft
Logo
Logo
Native API Functions
Logo
About MeCrow's Nest
Syllabus
Malware Development – Welcome to the Dark Side: Part 1 - CheckmateCheckmate
Logo
The Art Of Malware - Bringing the dead back to life0x00sec - The Home of the Hacker
Useful Libraries for Malware DevelopmentHack.Learn.Share
Logo
cocomelonccocomelonc
Logo
Anti-Debug TricksAnti-Debug Tricks
Logo
ToolsRed Teaming and Malware Analysis
Malware development part 1 - basics
Maelstrom #1: An Introductionpre.empt
IntroductionBuilding C2 Implants in C++: A Primer
Malleable C2Empire Wiki
C2 Matrix Eval LabC2 Matrix
Learning Sliver C2 (01) - Tutorial / Installation
Logo
Building a Basic C20xRick's Blog
MalAPI.io
ANY.RUN - Interactive Online Malware Sandbox
Logo
FireHOL IP Lists | IP Blacklists | IP Reputation FeedsFireHOL IP Lists
abuse.ch - Figthing malware and botnetsabuse_ch
Logo
https://vx-underground.org/vx-underground.org
FarghlyMalFarghlyMal
OALABS ResearchOALABS Research
Logo
How to start RE/malware analysis?hasherezade's 1001 nights
Reverse engineering of black-box binaries with symbolic and concolic execution techniques Recon 2022pretalx
x86 Overview | RE for BeginnersRE for Beginners
malwareunicorn.orgmalwareunicorn
Logo
Crackmes
Reverse EngineeringCTF Playbook
Reversing Binaries: CTF Edition
Regex tutorial  —  A quick cheatsheet by examplesMedium
A Complete Malware Analysis Tutorials, Cheatsheet & Tools list for Security ProfessionalsGBHackers - Latest Cyber Security News | Hacker News
Malware namesMicrosoftLearn
Logo
Logo
Analyzing Malicious Documents Cheat SheetLenny Zeltser
Tips for Reverse-Engineering Malicious CodeLenny Zeltser
Cheat Sheet for Analyzing Malicious SoftwareLenny Zeltser
Getting Started with Exploit DevelopmentDAY[0]
Tut01: GDB/x86 - CS6265: Information Security Lab
Binary Exploitation NotesBinary Exploitation
Kernel Hacking - Introduction To The Linux Kernel(1/3) :: Marco Cetica
Logo
Betaflight
Download and Install | QGC Guide (master)
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo